General
-
Target
b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280
-
Size
1.2MB
-
Sample
240405-ad3q1afa96
-
MD5
1e1d769110f5977c72c6011b7c88a3de
-
SHA1
520599bc8030c00931d3af9e56b8d2ad0c46f06e
-
SHA256
b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280
-
SHA512
d2e086fcfc8f85daefdaea0233edb393d9ff82666041d957d69d656fdd0086694cadea8c7226a3f437ad7ac836a2d4e19cb80a470940b0c019a3d3f661c0a77c
-
SSDEEP
24576:t2DEBwHRoEZGcqZJuVtWOPAo87hdhH/4TRH7E39BLmpetnkCdXC:QXZhHtTYftQTRH7E3ypetnpdXC
Behavioral task
behavioral1
Sample
b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280
-
Size
1.2MB
-
MD5
1e1d769110f5977c72c6011b7c88a3de
-
SHA1
520599bc8030c00931d3af9e56b8d2ad0c46f06e
-
SHA256
b1b4bf790878c93d88b826bbe29be588d1599e1677ca62b7fa944ed37ce39280
-
SHA512
d2e086fcfc8f85daefdaea0233edb393d9ff82666041d957d69d656fdd0086694cadea8c7226a3f437ad7ac836a2d4e19cb80a470940b0c019a3d3f661c0a77c
-
SSDEEP
24576:t2DEBwHRoEZGcqZJuVtWOPAo87hdhH/4TRH7E39BLmpetnkCdXC:QXZhHtTYftQTRH7E3ypetnpdXC
Score9/10-
Detects executables containing possible sandbox analysis VM usernames
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-